Security in Embedded Systems: Design Challenges
暂无分享,去创建一个
[1] Jean-Jacques Quisquater,et al. Montgomery Exponentiation with no Final Subtractions: Improved Results , 2000, CHES.
[2] Erik Tews,et al. Side Channels in the McEliece PKC , 2008, PQCrypto.
[3] Falko Strenzke. A Timing Attack against the Secret Permutation in the McEliece PKC , 2010, PQCrypto.
[4] Siva Sai Yerubandi,et al. Differential Power Analysis , 2002 .
[5] Paul Dischamp,et al. Power Analysis, What Is Now Possible , 2000, ASIACRYPT.
[6] Francis Olivier,et al. Electromagnetic Analysis: Concrete Results , 2001, CHES.
[7] C. D. Walter,et al. Distinguishing Exponent Digits by Observing Modular Subtractions , 2001, CT-RSA.
[8] Paul C. Kocher,et al. Differential Power Analysis , 1999, CRYPTO.
[9] Abdulhadi Shoufan,et al. A Timing Attack against Patterson Algorithm in the McEliece PKC , 2009, ICISC.
[10] Robert H. Deng,et al. On the equivalence of McEliece's and Niederreiter's public-key cryptosystems , 1994, IEEE Trans. Inf. Theory.
[11] Marc Joye,et al. Chinese Remaindering Based Cryptosystems in the Presence of Faults , 1999, Journal of Cryptology.
[12] Helena Handschuh. Cryptanalyse et sécurité des algorithmes a clé secrète , 1999 .
[13] Miroslaw Kutylowski,et al. Hamming Weight Attacks on Cryptographic Hardware - Breaking Masking Defense , 2002, ESORICS.
[14] M. Kuhn,et al. The Advanced Computing Systems Association Design Principles for Tamper-resistant Smartcard Processors Design Principles for Tamper-resistant Smartcard Processors , 2022 .
[15] Jean-Jacques Quisquater,et al. A new tool for non-intrusive analysis of smart cards based on electromagnetic emissions. The SEMA and DEMA methods , 2000 .
[16] Richard J. Lipton,et al. On the Importance of Checking Cryptographic Protocols for Faults (Extended Abstract) , 1997, EUROCRYPT.